Sciweavers

1019 search results - page 29 / 204
» Cryptographic Design Vulnerabilities
Sort
View
DBSEC
2007
89views Database» more  DBSEC 2007»
14 years 11 months ago
Design and Analysis of Querying Encrypted Data in Relational Databases
Security and privacy concerns as well as legal considerations force many companies to encrypt the sensitive data in databases. However, storing the data in an encrypted format enta...
Mustafa Canim, Murat Kantarcioglu
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
FC
2007
Springer
138views Cryptology» more  FC 2007»
15 years 3 months ago
Cryptographic Securities Exchanges
While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their o...
Christopher Thorpe, David C. Parkes
TGC
2005
Springer
15 years 2 months ago
Programming Cryptographic Protocols
Cryptographic protocols are useful for trust engineering in distributed transactions. Transactions require specific degrees of confidentiality and agreement between the principal...
Joshua D. Guttman, Jonathan C. Herzog, John D. Ram...
DAM
2008
70views more  DAM 2008»
14 years 9 months ago
Pairings for cryptographers
Many research papers in pairing based cryptography treat pairings as a "black box". These papers build cryptographic schemes making use of various properties of pairings....
Steven D. Galbraith, Kenneth G. Paterson, Nigel P....